It appears that you're running an Ad-Blocker. This site is monetized by Advertising and by User Donations; we ask that if you find this site helpful that you whitelist us in your Ad-Blocker, or make a Donation to help aid in operating costs.

intro--------reverse engineering is all about manipulating programs to do what you want.e.g changing notepad to accept a bigger buffer and anything else you want..What i've started you off on is serial fishing this is the best way to startlearning about debugging and deadlisting i'll explain it as we progress throughthe tutorial..

tools-------w32dasm (debugger - good for deadlisting)brain (not really required this time )We begin by loading the program.. so we can check for error boxes and find string refrences. Basically get a general idea of how the program worksand operates, in this case you just enter a serial and try register it..Well we enter any random data we want '12t31t' for example..then we click register an error box we write this down and then close the programnow we have a string refrence to work with..So we load up w32dasm and then click on Dissasmbler in the menu you choose toopen a file to dissasemblefind your program and open it.. you will see it decompiling etc and giving you asm instructions when its done, it should look like thisDisassembly of File: ugnuno.exeCode Offset = 00001000, Code Size = 00002000Data Offset = 00004000, Data Size = 00001000

if you dont see something like that and you see wingdings you will have to change your fontagain click on Dissasmbler in the menu you choose tofont >and just choose a font now that that is out of the way we want to get all the string refrencesto get these you click on the button next to the printer icon it says strn ref in blue textclick on that and a dialog pops up.. he what do you know the silly programmer has a string refrenceto the answer :| thats how simple it was just checking string refrences next i will go more indepthand make it so you actually have to get the serial number out of the program.. and of course therewill be a tut at the end of the week to guide you through if you can't find the time to search for answersyourself

The wise make mistakes, the fools repeat them----------------------------------------When you have eliminated the impossible, that which remains, however improbable, must be the truth

fun fun:) very informative. I was hoping this was on reverse social engineering, But there are many forms of engineering, and revere processes. Just as there are many names to a hacker, and many hackers who are un-named. Kinda like anyone on the human genome project is a hacker imo.

"Beware the Jabberwock, my son!The jaws that bite, the claws that catch!Beware the Jubjub bird, and shunThe frumious Bandersnatch!"